Two-Thirds of Phishing Emails in Ed Use 'Attached Invoice' Ploy

The most common form of phishing email in education tends to include an attached invoice; 66 percent of hacker attempts use the attached invoice ploy to get unwary recipients to click on an infected link; another 28 percent use a payment notification scheme; and 6 percent try online order tricks.

The findings were shared by digital security vendor Cofense, in its "State of Phishing Defense 2018" report. The company provides online services to organizations that automates response to suspicious emails and also helps them condition their employees to recognize and report phishing. (In other words, the company facilitates employers sending fake emails to test how savvy their workforce is.) For the report, Cofense used data gathered through the experiences of 1,400 clients in 23 industries around the world covering real attack attempts correlated with customer simulation data.

The same analysis found that 11 percent of malicious emails in education reported turned out to be actual phishing attempts, slightly higher than the cross-industry rate of 10 percent. The others were ordinary emails that users just thought were fake. Of course, as the report's authors pointed out, "It takes just one successful phish to inflict a costly toll."

The top phishing campaigns tended to use "invoice" in the subject header. That word appeared in seven of the top 10 headers for actual phishes. Also highly popular: "payment remittance," "statement" and "payment."

More than half of reported phishes across all segments (53 percent) were sent to collect user logins, according to Cofense. This "credential phishing" typically includes a link to a malicious landing page, enabling criminals to gain access to internal data or "establish a network foothold." To protect against this delivery mechanism for malware, the company recommended that organizations use a "steady diet of credential phishing" in their simulation programs., particularly if the operation uses a lot of cloud services.

The report, which called Microsoft Office macros "the Domino's of malware delivery," said that nearly half of all malware analyzed (45 percent) currently "lurks" in Office macros. One option is for schools to disable macros in emails, forcing users to "enable" content before they work with it. Another approach is to block or "gray-list" documents from both known malware sources and unknown sites and balance that with user education.

The security firm recommended that organizations train users "to view attachments suspiciously," especially if they include invoices, online orders or anything that might contain a macro. Also, users need to be on the watch especially during intense periods of financial processing, such as end-of-month, end-of-quarter and end-of-year periods.

Cofense also suggested that organizations run phishing simulations based on real threats and the newest subjects or themes that have been circulating.

"We see phishing emails bypass technology controls every day and more and more end-users recognizing and reporting these threats that slipped past million-dollar defenses," said Aaron Higbee, co-founder and chief technology officer of Cofense, in a statement. "The results of our research...shows that resiliency is building across key industries thanks to those same people that were once deemed as the weakest-links in an organization. These trends are powerful and reinforce that humans are a key element to a successful security program."

The full report, with additional recommendations, is available with registration on the Cofense website.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • laptop with digital productivity and calendar symbols

    September 2025 Tech Tactics in Education Conference Agenda Announced

    Registration is free for this fully virtual Sept. 25 event, focused on "Overcoming Roadblocks to Innovation" in K-12 and higher education.

  • stylized illustration of a desktop, laptop, tablet, and smartphone all displaying an orange AI icon

    Survey: AI Shifting from Cloud to PCs

    A recent Intel-commissioned report identifies a significant shift in AI adoption, moving away from the cloud and closer to the user. Businesses are increasingly turning to the specialized hardware of AI PCs, the survey found, recognizing their potential not just for productivity gains, but for revolutionizing IT efficiency, fortifying data security, and delivering a compelling return on investment by bringing AI capabilities directly to the edge.

  • robot brain with various technology and business icons

    Google Cloud Study: Early Agentic AI Adopters See Better ROI

    Google Cloud has released its second annual ROI of AI study, finding that 52% of enterprise organizations now deploy AI agents in production environments. The comprehensive survey of 3,466 senior leaders across 24 countries highlights the emergence of a distinct group of "agentic AI early adopters" who are achieving measurably higher returns on their AI investments.

  • file folder with glowing cloud symbol

    95% of IT Leaders Encounter Unexpected Cloud Storage Costs

    A recent report from Backblaze found nearly all large organizations face hidden cloud storage charges that limit flexibility and drive data lock-in.